We have decided to make a business change that includes no longer directly selling phone services, but instead we are moving our clients to RingCentral. They are the industry leaders in this type of service and their rates are very competitive. One of their killer features is the Teams integration
RingCentral for Teams – Embedded App
RingCentral for Teams embedded app enables calling from the Teams app to both internal extensions and external numbers. It’s the simplest way to supercharge the phone experience for both end users and IT admins without having to deploy a new app to end users. Most importantly, there’s no need for an added Microsoft calling or E5 license to capture this value. This solution is ideal for organizations that want to:
leverage RingCentral’s superior telephony while maximizing the value of their Teams investment
avoid the added cost of Microsoft’s calling license
With the RingCentral for Teams embedded app, users access an icon presented in Microsoft Teams. They can then place and receive calls, access voicemails and voicemail transcriptions, and send or receive an SMS or fax. These tools fill critical gaps in Microsoft Teams, transforming it from messaging and video meeting tool to a communications powerhouse. This approach is also a money saver, as it doesn’t require the added cost of a Teams Phone or E5 license.
If your company is currently using Microsoft Teams for communications and want to add the incredible functionality that RingCentral brings, then contact us for assistance.
This is the first in a series that document the Tier 3 / Co-Managed IT work we did to setup a wireless test bed for a Linux based scientific device. The testing environment included two different wireless network hardware types (Ubiquiti and Cisco). There was also a Synology device used for various purposes including hosting the Ubiquiti controller inside a Kubernetes container, providing certificate services, providing LDAP authentication, and providing RADIUS authentication. Each article will detail a separate piece of the project. This article shows the basic setup of Cisco Wireless Controller.
Setup of Cisco Wireless Controller
Plug -in ethernet of Computer to port 2 on controller
Boot controller and wait for SYS light to go solid
Open web browser to http://192.168.1.1
Create admin username
Create password
Fill in the needed information:
System nameManagement IP Subnet MaskDefault Gateway
Click Next
Fill in temporary information for wireless
Network BSSIDCreate PassphraseEnter local DHCP server address
Compliance is and always has been a complicated matter. Here are the quotes from the three types of compliance – CMMC, HIPAA, and PCI:
“CMMC – Risk AssessmentL2-3.11.2 – VULNERABILITY SCAN: Scan for vulnerabilities in organizational systems and applications periodically and when new vulnerabilities affecting those systems and applications are identified.”
“HIPAA – § 164.308 Administrative safeguards. (a)(1)(ii)(A) –Risk analysis (Required). Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate.”
“PCI – 11.3: External and internal vulnerabilities are regularly identified, prioritized, and addressed”
To summarize what this all mean – compliance requires penetration testing and vulnerability scanning. Networks have to be tested regularly to make sure that there has been nothing missed which would allow a hacker to breach the network and steal the treasure of information. Our recommendation is to scan at least quarterly, if not monthly, to find these vulnerabilities and address them before the hackers find them.
If your company has compliance requirements that you need consulting for, then contact us for assistance.
Today we tell the story of a medical office’s journey to the cloud. This particular client was facing their server operating system reaching end of support (a HIPAA violation) in the near future. They had begun by looking at their electronic medical records software company’s online offering, which didn’t have all the functionality of their on-premises software and was very expensive (this is typical).
They next decided to look into moving their current on-premises software into the cloud and we were asked to help with the testing. We determined that it would be best to move the file portion of the server to SharePoint / OneDrive to increase their mobility and flexibility. We also determined that it would be best to move them away from on premises Active Directory into Azure Active Directory / Intune to allow authentication and security policies. Finally we began testing the on-premises software hosted on a server in Azure with a VPN connection to their office.
The SharePoint / OneDrive and Azure Active Directory portions went through with little issues. The server, however, was not as we had hoped. The Azure VPN connection was expensive due to it always being on and no way of turning it off outside of business hours. The performance of the SQL database that the on-premises software used was basically unusable. The other option would be to create virtual desktops on Azure for this purpose but the cost and functionality was not what the customer was hoping for.
This has lead them back to searching for an online EMR software that will meet all their requirements. This will be tough because most companies are good at some things, but not all things and compromises usually have to be made. Our hope is that this story is a lesson to other companies. The cloud may sound like the newest and best way to work, but the costs and functionality are often worse than expected.
If your company is going to use full disk encryption or has compliance requirements that you need consulting for, then contact us for assistance.
Worked with a client lately to help them Automate a workflow, but you may be wondering what does that even mean. Let me explain. We all have tasks in our workday that are repetitive and consume little bite size pieces of our time. Depending on the steps needed to accomplish these tasks, they can be “delegated” to a computer process via scripting aka we automate them. In the case of the client we helped, they received emails from an eFax service which included attachments. These attachments had to be manually saved into a shared folder for the rest of the staff to access as needed. This process probably took about 30 to 60 seconds each, but multiply this by the 30+ faxes they received each day you have 15 to 30 minutes of wasted time each day (65-130 hours per year). This does not take into account the time taken to stop doing one thing, accomplish this task, and restart the original thing they were doing.
Automate to Freedom
What if we could automate this little task and keep them employee free to do other more important things? We did. They customer uses Office 365 which includes a service called Power Automate. We scripted this tool to look at incoming messages, find ones from the eFax vendor, strip out the attachment, and save it to a SharePoint folder. This can then be shared with other employees and even synced via OneDrive to their Desktops for viewing, etc. That is just the tip of the iceberg as there is so much more that can be done with this technology.
If your company wasting little bite size pieces of time in repetitive taks, then contact us for assistance.
We were discussing the price customers paid for their monthly maintenance of computers and the comparison was brought up about insurance costs. As a business owner with employees, it is necessary these days to offer health insurance as part of their compensation package. If the company has vehicles that are used for business, then the government mandates that they be covered by minimum amounts of insurance. These costs are then built into the price the business owner then charges their clients for products or services.
Insurance Statistics:
According to Business.com, the average cost of health insurance for a single employee was $645 per month and $1,850 per month for a family.
According to NerdWallet.com, the average cost of car insurance was $179 per vehicle per month.
Questions:
So what about the “digital” employees of the company, aka the computers and network equipment that make business possible. How much are business owners paying to “insure” these assets? What are businesses willing to pay to make sure that their computers and network don’t have a sick day? Does the cost of insuring them include preventative care? Who does the business call in case of an accident or breakdown in the middle of the day? Does the cost of insuring include on-site service or transport to a service center?
If your company wants to keep their digital employees healthy and insure them from accidents, then contact us for assistance.
Recently had an issue with a backup software that would get stuck in START_PENDING status at every startup. This caused it to be unable to be uninstalled, repaired, or forcefully removed and re-installed. Here is how we fixed it:
1. Find out the Service Name of the service by looking for it in the Services control panel:
2. Open command prompt as administrator
3. To get the PID type in – sc queryex [Service Name]
4. To kill the errant process type in – taskkill /f /pid [PID]
5. To remove the process type in – sc delete [Service Name]
One I had removed the process I restarted the server just to make sure then re-installed the software.
If your company needs help troubleshooting software issues, then contact us for assistance.
Every modern business has one thing in common – the internet.
Businesses are using computers, smart phones, tablets, etc. to connect to the internet for research, shopping, advertising, or any number of things. With a connection to the internet comes the need for routers, switches, wireless, and other network hardware to distribute internet connectivity across the company. There are malicious people on the internet that are setting traps and trying to break into companies which necessitate the use of tools like antivirus, internet filtering, spam filtering, and other protective measures. There are also people who work from their homes and need to have a way of tunneling safely into the network to use the resources there.
All of this has to be managed by someone in the company or you can contract with a managed IT service provider.
If your company needs help managing all the things connected to your internet, then contact us for assistance.
Make sure Hyper-V Host has CPUs than the combined total of CPUs for all servers being restored as these static until after the VMs are completely restored. If there is not enough CPU resources then the VMs will not boot.
Make sure Hyper-V Host has more than the combined total of RAM for all servers being restored as these settings are static until after the VMs are completely restored. If there is not enough memory then the VMs will not boot.
Create a SET NIC Team on the server (if you have multiple NICs)
Open Powershell as administrator
User the New-VMSwitch command to setup an external virtual switch to connect to for live connections
The AllowManagementOS is needed if you are using the same NIC team to access the VM host
Setup secondary Internal vSwitch to allow for testing before deploying
Setup Synology LUN targets for each VM to be restored. Make sure that they are big enough to hold all the full uncompressed size of the entire thick provisioned hard drives for the entire server.
Connect each LUN to the iSCSI Initiator on the VM Host. Make sure to bring them online, initialize them, and give them a drive letter. Synology needs this because it uses the SMB protocol to transfer the files during restore.
Make sure to allow the File and Printer Sharing app through the Windows firewall and open port 5986 to allow HTTP traffic for WinRM to allow Synology to query the Hyper-V settings.
Add the Hyper-V Host to the Active Backup for Business app.
Synology Active Backup Restore to Hyper-V
Open the Active Backup for Business app
Click on the Physical Server tab on the left
Select the server and click the Restore button
Select the point in time to restore from
Choose Restore to Microsoft Hyper-V
Choose Full Virtual Machine Restore
Change the Restore Name
Select a folder on the Hyper-V Host to place the configuration files
Select a folder on the Hyper-V Host to place each of the restore VHD files
Select a Virtual Switch on the Hyper-V Host to connect the VM to
Confirm the settings by clicking on the Done button.
After:
The VMs will boot with a single NIC and no network settings. Keep them offline and add additional NICs as needed to match the original setup. Then configure the NICs as before upon reboot. Make sure to connect to Internal Test Switch for initial steps.
Check hardware configuration of CPUs and RAM to determine if adjustments can be made. In particular, the RAM settings can be changed to startup, minimum, and maximum to allow for distribution of resources to VMs that have heavier workloads.
Boot VM to make sure it is functioning correctly. (first bootup can take upwards of 15 minutes)
Convert the VM from Gen1 to Gen2
Download Windows 10 ISO – https://www.microsoft.com/en-us/software-download/windows10
The information technology industry, also known as the IT industry, is a sizable and quickly expanding sector that includes a wide range of computing-related activities, such as software development, hardware manufacturing, networking, data analysis, cybersecurity, and digital marketing, among others.
At Farmhouse Networking, we utilize the power of IT to help our clients improve their businesses and elevate their services to the next level. Our group offers expert assistance to networks for small- to medium-sized businesses. We possess the range and depth of expertise necessary to effectively operate business-class networks thanks to years of experience.
Our team has been fervently pursuing the best technologies and tools for our clients! Our passion for delivering nothing but the best for our partners. Today, we are proud to announce that we are reaping the benefits of the fruits of our labors as we introduce our latest Clutch award. We’ve been named as one of the game-changing IT Managed Service Providers in Portland.
Clutch, for those of you who aren’t familiar with this company, they are an established platform in the heart of Washington, DC, committed to helping small, mid-market, and enterprise businesses identify and connect with the service providers they need to achieve their goals.
We would like to extend our sincere gratitude to Clutch, their staff, and everyone else who helped choose our company for this game-changer award. We are sincerely touched and appreciative of your acknowledgment.
Our company would also like to express our appreciation to clients and partners for their support. To show our gratitude and appreciation, here are some of the teams’ favorite reviews throughout the years!
“Farmhouse networking always has the help we need and seems to look out for our company like it was their business. Scott is never pushy and is always available to answer questions so we feel confident in our decisions.” Josh Confer, Webmaster at Chief Aircraft Inc
“Their customer service has been outstanding. Working with them on this project is perfect because they are already familiar with our location.” Mikaila Herman, Office Manager at Chinook Forest Management